Anomaly intrusion detection using one class SVM
暂无分享,去创建一个
Andrew S. Miner | Y. Wang | J. Wong | A. Miner | A. Miner | Yanxin Wang | Johnny Wong
[1] R. Jagannathan,et al. A prototype real-time intrusion-detection expert system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[2] Christopher Krügel,et al. Distributed Pattern Detection for Intrusion Detection , 2002, NDSS.
[3] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[4] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[5] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[6] Vasant Honavar,et al. Feature Selection Using a Genetic Algorithm for Intrusion Detection , 1999, GECCO.
[7] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[8] K. Tan,et al. The application of neural networks to UNIX computer security , 1995, Proceedings of ICNN'95 - International Conference on Neural Networks.
[9] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] Christopher J. C. Burges,et al. A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.
[11] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[12] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[14] Chih-Jen Lin,et al. Training v-Support Vector Regression: Theory and Algorithms , 2002, Neural Computation.
[15] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[16] Eleazar Eskin,et al. The Spectrum Kernel: A String Kernel for SVM Protein Classification , 2001, Pacific Symposium on Biocomputing.
[17] John C. Platt,et al. Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .
[18] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[19] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[20] A.H. Sung,et al. Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..
[21] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[22] Kymie M. C. Tan,et al. Anomaly Detection in Embedded Systems , 2002, IEEE Trans. Computers.
[23] Mehryar Mohri,et al. Positive Definite Rational Kernels , 2003, COLT.
[24] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[25] Andrew H. Sung,et al. Feature Selection for Intrusion Detection with Neural Networks and Support Vector Machines , 2003 .
[26] Xiangyang Li,et al. Decision Tree Classifiers for Computer Intrusion Detection , 2001, Scalable Comput. Pract. Exp..
[27] Chih-Jen Lin,et al. Training nu-support vector regression: theory and algorithms. , 2002, Neural computation.